apidoc-core is the core parser library to generate apidoc result following the apidoc-spec. A Prototype Pollution vulnerability in the preProcess function of apidoc-core versions thru 0.15.0 allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
References
Configurations
History
16 Oct 2025, 15:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apidocjs:apidoc-core:*:*:*:*:*:node.js:*:* | |
First Time |
Apidocjs
Apidocjs apidoc-core |
|
References | () https://github.com/OrangeShieldInfos/PoCs/tree/main/JavaScript/prototype-pollution/CVE-2025-57317 - Third Party Advisory | |
References | () https://github.com/VulnSageAgent/PoCs/blob/main/JavaScript/prototype-pollution/apidoc-core%400.15.0/index.js - Broken Link |
25 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-400 |
25 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-25 14:15
Updated : 2025-10-16 15:49
NVD link : CVE-2025-57317
Mitre link : CVE-2025-57317
CVE.ORG link : CVE-2025-57317
JSON object : View
Products Affected
apidocjs
- apidoc-core
CWE
CWE-400
Uncontrolled Resource Consumption